We face significant competition, which may adversely affect the occupancy and rental rates of our data centers.
We compete with numerous data center providers globally, many of whom own or operate properties similar to ours in some of the same metropolitan areas where our data centers are located, including Equinix, Inc. and NTT; various private operators in the U.S.; as well as Global Switch Holdings Limited and various regional operators in Europe, Asia, Latin America, Africa and Australia. In addition, we may in the future face competition from new entrants into the data center market, including new entrants who may acquire our current competitors. Some of our competitors and potential competitors have significant advantages over us, including greater name recognition, longer operating histories, pre-existing relationships with current or potential customers, significantly greater financial, marketing and other resources and more ready access to capital which allow them to respond more quickly to new or changing opportunities.
If our competitors offer space that our customers or potential customers perceive to be superior to ours based on factors such as available power, security, location, or connectivity, or if they offer rental rates below current market rates, or below the rental rates we are offering, we may lose customers or potential customers or be required to incur costs to improve our data centers or reduce our rental rates. In addition, many of our competitors have developed and continue to develop additional data center space. If the supply of data center space continues to increase as a result of these activities or otherwise, rental rates may be reduced or we may face delays in leasing or be unable to lease our vacant space, including space that we develop. Further, if customers or potential customers desire services that we do not offer, we may not be able to lease our space to those customers. Our financial condition, results of operations, cash flow, cash available for distribution and ability to satisfy our debt service obligations could be materially adversely affected as a result of any or all of these factors.
Any failure of our physical or information technology or operational technology infrastructure or services could lead to significant costs and disruptions.
Our business depends on providing customers with highly reliable services, including with respect to power supply, physical security, cybersecurity, and maintenance of environmental conditions. We may fail to provide such services because our operations are vulnerable to, among other things, mechanical or telecommunications failure, power outage, human error, physical or electronic security breaches, cyberattacks, war, terrorism, fire, earthquake, pandemics, hurricane, flood and other natural disasters, sabotage and vandalism.
Substantially all of our customer agreements include terms requiring us to meet certain service level commitments. Any failure to meet these or other commitments or any equipment damage in our data centers due to any reason could subject us to contractual liability, including service level credits against customer rent payments, legal liability and monetary damages, regulatory sanctions, or, in certain cases of repeated failures, the right by the customer to terminate the agreement. Service interruptions, equipment failures or security breaches could also materially impact our brand and reputation globally and lead to customer contract terminations or non-renewals and an inability to attract customers in the future.
We and our third-party providers may be vulnerable to cyberattacks and security breaches that could materially disrupt or compromise our operations, data and results.
We rely on computer systems, hardware, software, online sites and networks, as well as physical, digital and operational technology infrastructure to support our internal and external operations (collectively, “Information Systems”). We own, operate, and manage complex, global Information Systems and also rely on third-party providers for a range of Information Systems and other products and services, such as cloud computing. We face evolving risks that threaten the confidentiality, integrity, and availability of Information Systems and data, including from state-sponsored espionage actors, financially motivated hackers, hacktivists and insiders, as well as through diverse attack vectors, such as social engineering/phishing, malware (including ransomware), human or technological error, or due to “bugs,” misconfigurations and known and unknown vulnerabilities in hardware, software, systems and processes that support our business.